This paper presents a numerical study on the pullout behavior of the rockholt grouted system. Among the complicated failure modes of the rockbolt grouted system, the crack of the grout is concerned here. A tri- linear...This paper presents a numerical study on the pullout behavior of the rockholt grouted system. Among the complicated failure modes of the rockbolt grouted system, the crack of the grout is concerned here. A tri- linear cohesive zone model (CZM) is used to simulate the inteffacial behavior of rockbolt-grout interface: and a plastic damaged model is adopted for the grout materials. The feasibility of the numerical method is verified by comparing the calculated results with the test observations. The numerical results indicate that two types of cracks of the grout materials can be identified as the inclined crack and the horizontal crack. The inclined crack forms firstly and then the horizontal crack. Both cracks can reduce the interracial shear stress and thus reduce the load transfer efficiency. Further analysis indicates that the crack of the gout material can induce the obvious drops of load capacity, which is not a safe failure mode. This study leads to a better understanding of the mechanism for rockbolt grouted system.展开更多
Based on the analysis of data centre(DC) traffic pattern, we introduced a holistic software-defined optical DC solution. Architecture-on-Demand based hybrid optical switched(OPS/OCS) data centre network(DCN) fabric is...Based on the analysis of data centre(DC) traffic pattern, we introduced a holistic software-defined optical DC solution. Architecture-on-Demand based hybrid optical switched(OPS/OCS) data centre network(DCN) fabric is introduced, which is able to realise different inter-and intra-cluster configurations and dynamically support diverse traffic in the DC. The optical DCN is controlled and managed by a software-defined networking(SDN) enabled control plane to achieve high programmability. Moreover, virtual data centre(VDC) composition is developed as an application of such softwaredefined optical DC to create VDC slices for different tenants.展开更多
This paper focuses on the research of a semi-submersible platform equipped with a DP-assisted mooring system. Based on the working principles of the DP-assisted mooring system and the model of the platform motion, a t...This paper focuses on the research of a semi-submersible platform equipped with a DP-assisted mooring system. Based on the working principles of the DP-assisted mooring system and the model of the platform motion, a time domain simulation program is applied to analyze the impact, in the case of one line failure, on the platform motion, power consumption of the thrusters and the tension of the mooring lines. The results show that, under the 10-year wind dominant, a one line failure will have little impact on the tension of the mooring lines. When the failure line is windward, the power consumption will increase greatly with a weakened position of accuracy. However when the failure line is leeward, the power consumption will be reduced with a partly strengthened oosition of accuracy.展开更多
Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing...Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed.展开更多
The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific sec...The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.展开更多
This paper describes the platformisation of the mobile services domain,which in recent years has become a successful strategy for some hardware manufacturers and software companies.While having different platform stra...This paper describes the platformisation of the mobile services domain,which in recent years has become a successful strategy for some hardware manufacturers and software companies.While having different platform strategies and business models,they have succeeded in creating a demand for mobile software and content with end-users.This paper proposes a way to determine the optimum platform-charging mode that an operator should adopt to play a meaningful role in the mobile service domain and with respect to content with end-users.Four charging modes employed by mobile application stores are studied in this paper,namely the one-sided paid-by-users charging mode,the one-sided paid-by-advertisers charging mode,the two-sided differential paid charging mode and the two-sided paid and free access charging mode.Furthermore,a comparative analysis of the four modes is also presented.展开更多
This paper researches how to apply the advanced control technology of model predictive control (MPC) to the design of the dynamic positioning system (DPS) of a semi-submersible platform. First, a linear low-freque...This paper researches how to apply the advanced control technology of model predictive control (MPC) to the design of the dynamic positioning system (DPS) of a semi-submersible platform. First, a linear low-frequency motion model with three degrees of freedom was established in the context of a semi-submersible platform. Second, a model predictive controller was designed based on a model which took the constraints of the system into account. Third, simulation was carried out to demonstrate the feasibility of the controller. The results show that the model predictive controller has good performance and good at dealing with the constraints or the system.展开更多
基金financially supported by the National Natural Science Fund of China (Nos. 51304067 and 51104057)the Fund of Opening Laboratory for Deep Mine Construction, Henan Polytechnic University (No. 2012KF-01)the Education Department of Henan Province (No. 13A440311)
文摘This paper presents a numerical study on the pullout behavior of the rockholt grouted system. Among the complicated failure modes of the rockbolt grouted system, the crack of the grout is concerned here. A tri- linear cohesive zone model (CZM) is used to simulate the inteffacial behavior of rockbolt-grout interface: and a plastic damaged model is adopted for the grout materials. The feasibility of the numerical method is verified by comparing the calculated results with the test observations. The numerical results indicate that two types of cracks of the grout materials can be identified as the inclined crack and the horizontal crack. The inclined crack forms firstly and then the horizontal crack. Both cracks can reduce the interracial shear stress and thus reduce the load transfer efficiency. Further analysis indicates that the crack of the gout material can induce the obvious drops of load capacity, which is not a safe failure mode. This study leads to a better understanding of the mechanism for rockbolt grouted system.
基金performed in the Projects " LIGHTNESS : Low latency and high throughput dynamic network infrastructures for high performance datacentre interconnects" (No. 318606) "COSIGN: Combining Optics and SDN In next Generation data centre Networks" (No. 619572) supported by European Commission FP7
文摘Based on the analysis of data centre(DC) traffic pattern, we introduced a holistic software-defined optical DC solution. Architecture-on-Demand based hybrid optical switched(OPS/OCS) data centre network(DCN) fabric is introduced, which is able to realise different inter-and intra-cluster configurations and dynamically support diverse traffic in the DC. The optical DCN is controlled and managed by a software-defined networking(SDN) enabled control plane to achieve high programmability. Moreover, virtual data centre(VDC) composition is developed as an application of such softwaredefined optical DC to create VDC slices for different tenants.
基金Suppirted by the Programme of Introducing Talents of Discipline to Universities(B07019)
文摘This paper focuses on the research of a semi-submersible platform equipped with a DP-assisted mooring system. Based on the working principles of the DP-assisted mooring system and the model of the platform motion, a time domain simulation program is applied to analyze the impact, in the case of one line failure, on the platform motion, power consumption of the thrusters and the tension of the mooring lines. The results show that, under the 10-year wind dominant, a one line failure will have little impact on the tension of the mooring lines. When the failure line is windward, the power consumption will increase greatly with a weakened position of accuracy. However when the failure line is leeward, the power consumption will be reduced with a partly strengthened oosition of accuracy.
文摘Modem network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms. It reviews both algorithms under the model of search space decomposition, and homogenizes their search data structures. This approach not only guarantees deterministic lookup speed but also optimizes the data structure for efficient implementation oi1 many-core platforms. The performance evaluation reveals that the homogeneous data structure achieves 10Gbps line-rate 64byte packet classification throughput and multi-Gbps deep inspection speed.
基金This paper was supported by the National Natural Science Foundation of China under Grants No.91118006, No. 61202414 the Knowledge Innovation Project of Chinese Academy of Science under Grant No. ISCAS2009-DR14.
文摘The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.
基金supported by the National Natural Science Foundation of China under Grant No.61071077
文摘This paper describes the platformisation of the mobile services domain,which in recent years has become a successful strategy for some hardware manufacturers and software companies.While having different platform strategies and business models,they have succeeded in creating a demand for mobile software and content with end-users.This paper proposes a way to determine the optimum platform-charging mode that an operator should adopt to play a meaningful role in the mobile service domain and with respect to content with end-users.Four charging modes employed by mobile application stores are studied in this paper,namely the one-sided paid-by-users charging mode,the one-sided paid-by-advertisers charging mode,the two-sided differential paid charging mode and the two-sided paid and free access charging mode.Furthermore,a comparative analysis of the four modes is also presented.
基金Supported by the Basic Research Foundation of Central University(HEUCFZ1003)
文摘This paper researches how to apply the advanced control technology of model predictive control (MPC) to the design of the dynamic positioning system (DPS) of a semi-submersible platform. First, a linear low-frequency motion model with three degrees of freedom was established in the context of a semi-submersible platform. Second, a model predictive controller was designed based on a model which took the constraints of the system into account. Third, simulation was carried out to demonstrate the feasibility of the controller. The results show that the model predictive controller has good performance and good at dealing with the constraints or the system.